The following was filed automatically by setroubleshoot: Résumé: SELinux is preventing mdadm "getattr" access on /dev/shm/pulse-shm-3333611971. Description détaillée: [mdadm has a permissive type (mdadm_t). This access was not denied.] SELinux denied access requested by mdadm. It is not expected that this access is required by mdadm and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Autoriser l'accès: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Informations complémentaires: Contexte source system_u:system_r:mdadm_t:s0-s0:c0.c1023 Contexte cible unconfined_u:object_r:user_tmpfs_t:s0 Objets du contexte /dev/shm/pulse-shm-3333611971 [ file ] source mdadm Chemin de la source /sbin/mdadm Port <Inconnu> Hôte (removed) Paquetages RPM source mdadm-3.0-2.fc12 Paquetages RPM cible Politique RPM selinux-policy-3.6.30-2.fc12 Selinux activé True Type de politique targeted MLS activé True Mode strict Enforcing Nom du plugin catchall Nom de l'hôte (removed) Plateforme Linux (removed) 2.6.31-0.204.rc9.fc12.x86_64 #1 SMP Sat Sep 5 20:45:55 EDT 2009 x86_64 x86_64 Compteur d'alertes 1 Première alerte dim. 06 sept. 2009 09:42:40 CEST Dernière alerte dim. 06 sept. 2009 09:42:40 CEST ID local 1c2db244-bce5-4838-bc0e-21c4da4949bc Numéros des lignes Messages d'audit bruts node=(removed) type=AVC msg=audit(1252222960.934:64): avc: denied { getattr } for pid=2282 comm="mdadm" path="/dev/shm/pulse-shm-3333611971" dev=tmpfs ino=21748 scontext=system_u:system_r:mdadm_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_tmpfs_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1252222960.934:64): arch=c000003e syscall=262 success=yes exit=0 a0=5 a1=2393c9b a2=7fff64a14240 a3=100 items=0 ppid=1644 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="mdadm" exe="/sbin/mdadm" subj=system_u:system_r:mdadm_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= mdadm_t ============== allow mdadm_t user_tmpfs_t:file getattr;
Fixed in selinux-policy-3.6.30-4.fc12.noarch